查询词典 internet mail access protocol
- 与 internet mail access protocol 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Today, the Internet is one of the most powerful tools throughout the world. The Internet is a collection of various services and resources. According to Russ Brock, a director and consultant at the Center for Innovation and Inquiry, the Internet's main components are E-mail and the World Wide Web.
当晨曦的第一缕阳光渗透了窗帘,睁开睡醒朦胧的双眸,思念便溢满了心间,伴随着新的期许,不知是什么时候起,那遥远而真实的思念便似乎成为一种习惯,伴着我开始了新的一天,从晨曦趟过黑夜。
-
The protocol used in this kind of communication is Simple Object Access Protocol, an XML-based mark-up language.
在这些形式的沟通使用的协议是简单对象访问协议,基于XML语言的标志了。
-
The data capture mainly gathers the data from the network. Protocol analysis can analyse every segment of the data packet according to protocol standard. Data recover can recover all the data of the application layer of the TCP connection. IP spoofing can construct all kinds of packets and realize the network attack. Real-time interruption can interrupt the TCP connection of Both sides of communication as the third party. Fire wall can realize network access control. Then the system can protect the network information safety from many aspects.
数据捕获主要完成从网络采集数据的功能;分析还原包括协议分析和数据还原两部分内容,协议分析可以对捕获到的数据包按照网络协议规范分别进行各协议字段分析,数据还原功能可以将每条TCP连接中传输的所有应用数据进行重新组合,还原出原来数据的内容;IP欺骗指构造各种功能的数据包,实现网络攻击;实时阻断指第三方实时阻断通信双方的TCP连接,禁止他们进行数据通信;防火墙主要实现网络访问控制,保护内部子网的功能。
-
CDP is media and protocol independent, and runs on all Cisco equipment over the Subnetwork Access Protocol.
CDP 与媒介及协定无关,且透过子网路存取协定在所有 Cisco 设备上执行。
-
This thesis presents a MAC protocol, namely Opportunistic Cognitive MAC Protocol, for cognitive radios to access unoccupied resource opportunistically and coexist with wireless local area network.
这篇论文提出了一个新兴的感知型无线网路媒体存取层协定(Opportunistic Cognitive MAC Protocol),使感知型无线网路设备可以有效利用空闲的资源,与该频段和平共存。
-
Firstly, the model of distributed single-hop fully-connected FH-PRNs for missile systems is developed in this dissertation, which fully describes the physical and link level characteristics of the network. Common-transmitter-based spreading codes protocol and unslotted ALOHA channel access protocol are adopted, considering two types of services, i. e. Unacknowledged Data Packet and Acknowledged Data Packet.
首先,本文建立了战术导弹武器系统分布式单跳全连接跳频分组无线网的网络模型,所建模型充分地反映了网络的物理层和链路层特性,采用了公共码加发射码的扩频码协议及异步非时隙ALOHA信道访问协议,考虑了两类业务的情况,即无应答数据分组和有应答数据分组。
-
First, the stations'timing process and the slot aligning are discussed. Second, the dissertation propose a resource request random access method based on feedback. The performances of this method are analyzed. Third, proceed from the considerations of the MAC protocol for the HFC system, a QOS-oriental scheduling algorithm for the MAC protocol based on dynamic TDMA is proposed. Simulation results show that the performance of this algorithm is better than that of the first come first service. Forth, two contention resolution algorithms ----p-persistent CRA and tree CRA, which are usually adopted in the HFC system, are summarized. The delay and characteristic are compared. At last, the dissertation introduces the function implementation of the MAC layer based on COM21 UPSTREAMS.
首先,讨论了基站的同步进程和时隙同步的实现;然后,本文提出了一种带反馈模块的资源申请信号随机接入方法,并对其进行性能分析;然后,从HFC系统的MAC协议出发,提出了一种用于基于动态TDMA技术的MAC协议的业务安排算法,计算机仿真结果表明其性能优于先到先服务法的性能;然后概述了常用于HFC系统的两种冲突解决算法——p-坚持冲突解决算法和树型冲突解决算法,比较两者的时延性能与特征;最后,介绍了基于COM21 UPSTREAMS协议的MAC层功能实现,给出了硬件框图和照片。
-
NET Framework class library. It is the backbone of partially trusted code and is not restricted to file access, but rather affects everything from network access to windowing and more. When you use it in your own component code, users will be able to execute code regardless of origin, and their systems will remain safe. This allows you to write code that is featureful, executes in native machine language, and is distributed across a LBN or even over the Internet. You can take advantage of this feature with only a minimal exposure to the underlying mechanics of code access security.
NET框架类库来施用他是半信托代码的根蒂根基而且不受限于文件拜候,可是对路程经过过程收集拜候窗户或其它的不论什么情况都有至关的影响当您在您本身的组件代码中施用它时,用户可以在不消留心来历的情况下执行代码(好比从1个英特网网站),她们的体系仿照还是是安全的这似的您可以开具富有特征的、路程经过过程本机执行的而且漫衍拜候局域网甚至是英特网的代码您可以哄骗这些特征在代码拜候安全的根蒂根基下最小限度的袒露您的信息
-
The VxWorks network also fully supports the associated Internet Control Message Protocol and the Ethernet Address Resolution Protocol, as required by the relevant RFCs .
VxWorks 也完全支持相关的互联网控制消息协议和以太网地址解析协议,这是 RFC 规范要求支持的。
-
Secure Socket Layer protocol is the most widely deployed protocol for securing communications on the Internet network.
安全套接字协议是Internet上部署最为广泛的保证安全通信的协议。
- 相关中文对照歌词
- Bring My Mail
- FanMail
- Santa.Com (aka I'm Gonna Email Santa)
- Internet Thugs Attack
- My Internet Girl
- You've Got Mail Enhancement
- Internet Going Nutz
- Internet Connection
- Big Sunglasses
- Access Me
- 推荐网络例句
-
The rapid development of the company today, we welcome people of insight to join our team.
在公司快速发展的今天,我们欢迎有识之士加入我们的工作团队。
-
Will it be Garuda, then, or back to Tirol?
下一步是嘎鲁达,还是回泰洛?
-
Like Volkswagen did with the Scirocco, Ford is betting on the re-birth of a classic nameplate, and it's using a proven platform to do it.
像大众汽车公司也与Scirocco ,福特押注重新诞生了一个经典的品牌,它的使用证明的平台,做到这一点。